last executing test programs: 34.214340237s ago: executing program 3 (id=4152): pipe(&(0x7f0000000180)) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000280), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 33.129188041s ago: executing program 0 (id=4157): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xf, 0x4008032, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) io_pgetevents(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 32.829660396s ago: executing program 3 (id=4158): r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00') close_range(r0, 0xffffffffffffffff, 0x0) syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x3ff}}}}}}]}}, 0x0) ioctl$SIOCRSGCAUSE(r0, 0x4004550e, 0x0) 31.022729361s ago: executing program 0 (id=4167): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfff) syz_emit_ethernet(0x66, &(0x7f0000000340)={@local, @empty, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0200", 0x30, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x2, 0x0, 0x0, 0x0, {[@nop, @timestamp={0x8, 0xa}, @timestamp={0x8, 0xa}, @fastopen={0x22, 0x7, "ce2781a9df"}]}}}}}}}}, 0x0) 29.915691261s ago: executing program 3 (id=4171): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000005c0)='blkio.throttle.write_bps_device\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000600), 0x12) 29.379151321s ago: executing program 0 (id=4172): r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x0) r1 = fanotify_init(0x0, 0x0) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}) fanotify_mark(r1, 0x1, 0x22, r0, 0x0) 28.351598447s ago: executing program 3 (id=4174): r0 = socket$unix(0x1, 0x5, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0xd7ca259dc47776d0}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) 27.70785076s ago: executing program 0 (id=4175): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/crypto\x00', 0x0, 0x0) read$hiddev(r0, &(0x7f00000000c0)=""/4092, 0xffc) preadv(r0, &(0x7f00000012c0)=[{&(0x7f0000001800)=""/250, 0xfa}], 0x1, 0x40000002, 0x0) read$hiddev(r0, &(0x7f0000001100)=""/234, 0xea) 26.630036737s ago: executing program 3 (id=4178): openat$sysctl(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/mm/ksm/run\x00', 0x1, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) acct(&(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00') acct(0x0) 26.505540348s ago: executing program 0 (id=4179): r0 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000000c0)="ff", 0x1, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000140)='asymmetric\x00', &(0x7f0000000440)=@secondary) keyctl$KEYCTL_MOVE(0x1e, r0, 0xffffffffffffffff, r1, 0x0) 25.690855065s ago: executing program 3 (id=4180): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000a00)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x2, 0x0, 0x1, {0x4}}]}]}, 0x2c}}, 0x0) 25.61003059s ago: executing program 0 (id=4182): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000080)=0x1) write$tun(r0, &(0x7f00000000c0)={@val, @val={0x0, 0x3, 0x200, 0xd, 0x9, 0x100}, @mpls={[], @llc={@llc={0x4, 0xbc, "a3", "c6cf1615be5e188e0736777c59bea43701b1669cf7f03ec7a6"}}}}, 0x2a) 14.822210112s ago: executing program 2 (id=4200): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x4000002, 0x7, &(0x7f0000006680)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xf, 0x4008032, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) timerfd_create(0x8, 0x0) 12.55896416s ago: executing program 2 (id=4202): r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast1}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e24, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2, 0x0, 0x0) 10.326335467s ago: executing program 1 (id=4205): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000002c0)=@gettclass={0x24, 0x2a, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {0x0, 0x3}, {0x0, 0x3}}}, 0x24}}, 0x0) 10.21992489s ago: executing program 2 (id=4206): syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='environ\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) madvise(&(0x7f0000569000/0x2000)=nil, 0x2000, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fd/3\x00') 8.602180128s ago: executing program 2 (id=4210): madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) r0 = getpid() process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x2) 8.417133096s ago: executing program 1 (id=4211): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) rseq(&(0x7f00000004c0), 0x20, 0x0, 0x0) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1e71, 0x200f, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}}}]}}]}}, 0x0) cachestat(0xffffffffffffffff, 0x0, 0x0, 0x0) 5.607674885s ago: executing program 4 (id=4213): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r0}, 0x10) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) ioctl$CAPI_GET_MANUFACTURER(r1, 0xc0044306, &(0x7f0000000040)=0x67ffcda8) 5.15095664s ago: executing program 1 (id=4214): capset(&(0x7f0000000100)={0x20071026}, &(0x7f0000000140)) creat(&(0x7f0000000240)='./file0\x00', 0x0) chmod(&(0x7f0000000140)='./file0\x00', 0xfeff) creat(&(0x7f0000000300)='./file0\x00', 0x0) 4.686807241s ago: executing program 4 (id=4215): capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x81, 0xffffffff}) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) ioctl$TIOCL_SETSEL(r1, 0x541c, 0x0) 4.379443836s ago: executing program 1 (id=4216): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000500)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x9, 0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xffffffff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, 0x0) 4.039696997s ago: executing program 4 (id=4217): openat$sysctl(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/clear_refs\x00', 0x1, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) acct(&(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00') acct(0x0) 3.134386465s ago: executing program 4 (id=4218): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) 2.62520707s ago: executing program 4 (id=4219): madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) ioprio_set$pid(0x1, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000600)=""/172, 0xac}], 0x1, 0x0, 0x0) 2.339580582s ago: executing program 4 (id=4220): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) write$UHID_INPUT(r1, &(0x7f0000000000)={0xc, {"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", 0x1000}}, 0x1006) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000001040)) 1.949517822s ago: executing program 1 (id=4221): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0x1a, r0, 0xc, &(0x7f0000000000)) 989.925663ms ago: executing program 2 (id=4222): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000800"], &(0x7f00000003c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='contention_end\x00', r0}, 0x10) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000001c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000200)={0x97, 0x0, 'client0\x00', 0x0, "f89577e8d2f758fa", "2d0041c6c20e47e9bff3d8517c50a7a7b69c49cc9e6cf82457d74dd9dfff9d68"}) 740.155559ms ago: executing program 1 (id=4223): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000140), r0) sendmsg$NLBL_MGMT_C_ADDDEF(r1, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000007c0)={0x24, r2, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast1}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}]}, 0x24}}, 0x0) 0s ago: executing program 2 (id=4224): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xf, 0x4008032, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) truncate(0x0, 0x0) kernel console output (not intermixed with test programs): T25] usbhid 3-1:0.0: couldn't find an input interrupt endpoint [ 529.499952][ T25] usb 4-1: USB disconnect, device number 103 [ 529.929020][ T25] usb 3-1: USB disconnect, device number 91 [ 530.680522][ T29] kauditd_printk_skb: 154 callbacks suppressed [ 530.680541][ T29] audit: type=1400 audit(1725235496.416:9915): avc: denied { read write } for pid=5379 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 530.711464][ C1] vkms_vblank_simulate: vblank timer overrun [ 530.804714][ T29] audit: type=1400 audit(1725235496.456:9916): avc: denied { read write } for pid=5372 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 530.911023][ T29] audit: type=1400 audit(1725235496.456:9917): avc: denied { read write open } for pid=5372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 530.987423][ T29] audit: type=1400 audit(1725235496.466:9918): avc: denied { read } for pid=4661 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 531.075970][ T29] audit: type=1400 audit(1725235496.466:9919): avc: denied { search } for pid=4661 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 531.097544][ C1] vkms_vblank_simulate: vblank timer overrun [ 531.162324][ T29] audit: type=1400 audit(1725235496.466:9920): avc: denied { append } for pid=4661 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 531.262461][ T29] audit: type=1400 audit(1725235496.476:9921): avc: denied { read write open } for pid=5379 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 531.344703][ T29] audit: type=1400 audit(1725235496.476:9922): avc: denied { ioctl } for pid=5379 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=651 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 531.436001][ T29] audit: type=1400 audit(1725235496.487:9923): avc: denied { ioctl } for pid=5372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=650 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 531.461567][ C1] vkms_vblank_simulate: vblank timer overrun [ 531.545965][ T29] audit: type=1400 audit(1725235496.507:9924): avc: denied { append open } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 533.452130][ T5418] libceph: connect (1)[c::]:6789 error -101 [ 533.466387][ T5418] libceph: mon0 (1)[c::]:6789 connect error [ 533.500543][ T5418] libceph: connect (1)[c::]:6789 error -101 [ 533.533680][ T5418] libceph: mon0 (1)[c::]:6789 connect error [ 533.807273][ T5418] libceph: connect (1)[c::]:6789 error -101 [ 533.813608][ T5418] libceph: mon0 (1)[c::]:6789 connect error [ 534.164572][T13623] ceph: No mds server is up or the cluster is laggy [ 534.594840][T13638] veth1_macvtap: left promiscuous mode [ 534.600570][T13638] macsec0: entered promiscuous mode [ 534.643622][T13638] macsec0: entered allmulticast mode [ 534.689125][T13639] veth1_macvtap: entered promiscuous mode [ 534.748731][T13639] veth1_macvtap: entered allmulticast mode [ 534.769523][T13639] macsec0: left promiscuous mode [ 534.793293][T13639] macsec0: left allmulticast mode [ 534.814264][T13639] veth1_macvtap: left allmulticast mode [ 535.732708][ T29] kauditd_printk_skb: 171 callbacks suppressed [ 535.732727][ T29] audit: type=1400 audit(1725235501.467:10096): avc: denied { read write } for pid=5376 comm="syz-executor" name="loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 535.822729][ T29] audit: type=1400 audit(1725235501.497:10097): avc: denied { read write } for pid=5383 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 535.914238][ T29] audit: type=1400 audit(1725235501.497:10098): avc: denied { read write open } for pid=5383 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 535.982616][ T29] audit: type=1400 audit(1725235501.497:10099): avc: denied { ioctl } for pid=5383 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=653 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 536.047361][ T29] audit: type=1400 audit(1725235501.507:10100): avc: denied { read } for pid=4661 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 536.112504][ T29] audit: type=1400 audit(1725235501.517:10101): avc: denied { search } for pid=4661 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 536.188168][ T29] audit: type=1400 audit(1725235501.517:10102): avc: denied { append } for pid=4661 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 536.261507][ T29] audit: type=1400 audit(1725235501.517:10103): avc: denied { append open } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 536.351210][ T29] audit: type=1400 audit(1725235501.517:10104): avc: denied { getattr } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 536.400800][T13668] Process accounting resumed [ 536.424689][ T25] usb 3-1: new high-speed USB device number 92 using dummy_hcd [ 536.427868][ T29] audit: type=1400 audit(1725235501.527:10105): avc: denied { read write open } for pid=5376 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 536.632138][T13668] Process accounting resumed [ 536.644340][ T25] usb 3-1: Using ep0 maxpacket: 16 [ 536.716102][ T25] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 536.738600][ T25] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 536.772796][ T25] usb 3-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 9 [ 536.801289][ T25] usb 3-1: New USB device found, idVendor=045e, idProduct=07da, bcdDevice= 0.00 [ 536.837990][ T25] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 536.926670][ T25] usb 3-1: config 0 descriptor?? [ 537.526989][ T25] microsoft 0003:045E:07DA.0009: unknown main item tag 0x0 [ 537.571119][ T25] microsoft 0003:045E:07DA.0009: ignoring exceeding usage max [ 537.588474][ T25] microsoft 0003:045E:07DA.0009: No inputs registered, leaving [ 537.625153][ T25] microsoft 0003:045E:07DA.0009: hidraw0: USB HID v0.00 Device [HID 045e:07da] on usb-dummy_hcd.2-1/input0 [ 537.660876][ T25] microsoft 0003:045E:07DA.0009: no inputs found [ 537.673856][ T25] microsoft 0003:045E:07DA.0009: could not initialize ff, continuing anyway [ 537.762790][ T25] usb 3-1: USB disconnect, device number 92 [ 538.076990][T13687] netlink: 'syz.3.3920': attribute type 29 has an invalid length. [ 538.129311][T13687] netlink: 'syz.3.3920': attribute type 29 has an invalid length. [ 539.398973][T13705] devpts: called with bogus options [ 540.171449][T13714] wg0 speed is unknown, defaulting to 1000 [ 540.637238][T13725] can0: slcan on ttyS3. [ 540.796355][ T29] kauditd_printk_skb: 149 callbacks suppressed [ 540.796374][ T29] audit: type=1400 audit(1725235506.538:10255): avc: denied { read write } for pid=5383 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 540.893503][T13724] can0 (unregistered): slcan off ttyS3. [ 540.899817][T13724] Falling back ldisc for ttyS3. [ 540.904959][ T29] audit: type=1400 audit(1725235506.538:10256): avc: denied { read write open } for pid=5383 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 541.079290][ T29] audit: type=1400 audit(1725235506.588:10257): avc: denied { ioctl } for pid=5383 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=653 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 541.212970][ T29] audit: type=1400 audit(1725235506.618:10258): avc: denied { read } for pid=4893 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 541.333873][ T29] audit: type=1400 audit(1725235506.948:10259): avc: denied { read write } for pid=5376 comm="syz-executor" name="loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 541.471038][ T29] audit: type=1400 audit(1725235506.978:10260): avc: denied { read write open } for pid=5376 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 541.577076][ T29] audit: type=1400 audit(1725235507.008:10261): avc: denied { ioctl } for pid=5376 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=649 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 541.678154][ T29] audit: type=1400 audit(1725235507.058:10262): avc: denied { read } for pid=4893 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 541.763967][ T29] audit: type=1400 audit(1725235507.068:10263): avc: denied { read } for pid=4661 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 541.857534][ T29] audit: type=1400 audit(1725235507.068:10264): avc: denied { search } for pid=4661 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 543.234480][T13759] netlink: 24 bytes leftover after parsing attributes in process `syz.0.3952'. [ 544.220434][T13771] Invalid ELF header magic: != ELF [ 544.487538][T13773] wg0 speed is unknown, defaulting to 1000 [ 545.807366][ T29] kauditd_printk_skb: 153 callbacks suppressed [ 545.807386][ T29] audit: type=1400 audit(1725235511.539:10418): avc: denied { read write open } for pid=5378 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 545.890021][ T29] audit: type=1400 audit(1725235511.559:10419): avc: denied { read } for pid=4661 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 545.982815][ T29] audit: type=1400 audit(1725235511.559:10420): avc: denied { search } for pid=4661 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 546.058158][ T29] audit: type=1400 audit(1725235511.579:10421): avc: denied { append } for pid=4661 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 546.122395][ T29] audit: type=1400 audit(1725235511.579:10422): avc: denied { append open } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 546.204886][ T29] audit: type=1400 audit(1725235511.579:10423): avc: denied { getattr } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 546.285751][ T29] audit: type=1400 audit(1725235511.619:10424): avc: denied { ioctl } for pid=5378 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=652 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 546.391853][ T29] audit: type=1400 audit(1725235511.619:10425): avc: denied { read write } for pid=5383 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 546.464607][ T29] audit: type=1400 audit(1725235511.619:10426): avc: denied { read write open } for pid=5383 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 546.544996][ T29] audit: type=1400 audit(1725235511.619:10427): avc: denied { ioctl } for pid=5383 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=653 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 548.779306][ T1168] IPVS: starting estimator thread 0... [ 548.891998][T13842] IPVS: using max 17 ests per chain, 40800 per kthread [ 550.814139][ T29] kauditd_printk_skb: 137 callbacks suppressed [ 550.814156][ T29] audit: type=1400 audit(1725235516.550:10565): avc: denied { write } for pid=13867 comm="syz.0.4001" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 550.814901][T13868] netlink: 8 bytes leftover after parsing attributes in process `syz.0.4001'. [ 550.831540][ T29] audit: type=1400 audit(1725235516.550:10566): avc: denied { read write open } for pid=5383 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 551.016245][ T29] audit: type=1400 audit(1725235516.620:10567): avc: denied { ioctl } for pid=5383 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=653 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 551.104841][ T29] audit: type=1400 audit(1725235516.630:10568): avc: denied { read } for pid=4661 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 551.225996][ T29] audit: type=1400 audit(1725235516.630:10569): avc: denied { search } for pid=4661 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 551.321626][ T29] audit: type=1400 audit(1725235516.660:10570): avc: denied { append } for pid=4661 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 551.441296][ T29] audit: type=1400 audit(1725235516.660:10571): avc: denied { append open } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 551.537362][ T29] audit: type=1400 audit(1725235516.670:10572): avc: denied { getattr } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 551.650491][ T29] audit: type=1400 audit(1725235516.680:10573): avc: denied { read write } for pid=5372 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 551.691339][ T25] usb 5-1: new high-speed USB device number 103 using dummy_hcd [ 551.773304][ T29] audit: type=1400 audit(1725235516.680:10574): avc: denied { read write open } for pid=5372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 551.935871][ T25] usb 5-1: Using ep0 maxpacket: 32 [ 551.999075][ T25] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 552.026571][ T25] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 552.077526][ T25] usb 5-1: New USB device found, idVendor=056e, idProduct=00e6, bcdDevice= 0.00 [ 552.101129][ T25] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 552.168754][ T25] usb 5-1: config 0 descriptor?? [ 552.816391][ T25] elecom 0003:056E:00E6.000A: item fetching failed at offset 2/5 [ 552.859718][ T25] elecom 0003:056E:00E6.000A: probe with driver elecom failed with error -22 [ 552.919746][T13893] netlink: 'syz.0.4010': attribute type 11 has an invalid length. [ 553.249723][ T1168] usb 5-1: USB disconnect, device number 103 [ 554.323471][T13908] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=514 sclass=netlink_route_socket pid=13908 comm=syz.0.4018 [ 554.768395][T13915] usb usb9: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 555.017331][T13917] sp0: Synchronizing with TNC [ 555.839624][ T29] kauditd_printk_skb: 162 callbacks suppressed [ 555.839643][ T29] audit: type=1400 audit(1725235521.571:10737): avc: denied { read write } for pid=5372 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 555.894402][ T29] audit: type=1400 audit(1725235521.621:10738): avc: denied { read write open } for pid=5372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 555.894477][ T29] audit: type=1400 audit(1725235521.631:10739): avc: denied { ioctl } for pid=5372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=650 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 555.914859][ T29] audit: type=1400 audit(1725235521.651:10740): avc: denied { read write } for pid=5383 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 555.920645][ T29] audit: type=1400 audit(1725235521.651:10741): avc: denied { read write open } for pid=5383 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 555.920718][ T29] audit: type=1400 audit(1725235521.651:10742): avc: denied { ioctl } for pid=5383 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=653 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 556.078989][ T29] audit: type=1400 audit(1725235521.811:10743): avc: denied { read write } for pid=5378 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 556.086115][ T29] audit: type=1400 audit(1725235521.821:10744): avc: denied { read write open } for pid=5378 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 556.094023][ T29] audit: type=1400 audit(1725235521.831:10745): avc: denied { ioctl } for pid=5378 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=652 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 556.236873][ T29] audit: type=1400 audit(1725235521.971:10746): avc: denied { read write } for pid=5376 comm="syz-executor" name="loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 558.848280][T13976] netlink: 'syz.4.4050': attribute type 10 has an invalid length. [ 559.381681][ T46] IPVS: starting estimator thread 0... [ 559.490264][T13987] IPVS: using max 19 ests per chain, 45600 per kthread [ 560.845645][ T29] kauditd_printk_skb: 151 callbacks suppressed [ 560.845669][ T29] audit: type=1400 audit(1725235526.581:10898): avc: denied { read write open } for pid=5379 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 560.909992][ T29] audit: type=1400 audit(1725235526.621:10899): avc: denied { ioctl } for pid=5379 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=651 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 561.003887][ T29] audit: type=1400 audit(1725235526.621:10900): avc: denied { read write } for pid=5376 comm="syz-executor" name="loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 561.105888][ T29] audit: type=1400 audit(1725235526.631:10901): avc: denied { read } for pid=4661 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 561.169721][ T29] audit: type=1400 audit(1725235526.641:10902): avc: denied { search } for pid=4661 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 561.249846][ T29] audit: type=1400 audit(1725235526.641:10903): avc: denied { append } for pid=4661 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 561.350093][ T29] audit: type=1400 audit(1725235526.641:10904): avc: denied { append open } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 561.448562][ T29] audit: type=1400 audit(1725235526.681:10905): avc: denied { read write open } for pid=5376 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 561.508992][T14020] netlink: 8 bytes leftover after parsing attributes in process `syz.0.4067'. [ 561.526306][ T29] audit: type=1400 audit(1725235526.681:10906): avc: denied { ioctl } for pid=5376 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=649 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 561.534386][T14020] netlink: 'syz.0.4067': attribute type 2 has an invalid length. [ 561.599616][ T29] audit: type=1400 audit(1725235526.692:10907): avc: denied { getattr } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 561.759300][T14023] sp0: Synchronizing with TNC [ 561.861817][T14023] sp0: Found TNC [ 563.163874][ T1267] ieee802154 phy0 wpan0: encryption failed: -22 [ 563.171603][ T1267] ieee802154 phy1 wpan1: encryption failed: -22 [ 565.937195][ T29] kauditd_printk_skb: 173 callbacks suppressed [ 565.937213][ T29] audit: type=1400 audit(1725235531.672:11081): avc: denied { read write } for pid=5378 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 566.024739][ T29] audit: type=1400 audit(1725235531.692:11082): avc: denied { read write open } for pid=5378 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 566.145499][ T29] audit: type=1400 audit(1725235531.692:11083): avc: denied { ioctl } for pid=5378 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=652 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 566.224329][ T29] audit: type=1400 audit(1725235531.722:11084): avc: denied { read } for pid=4661 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 566.296912][ T29] audit: type=1400 audit(1725235531.722:11085): avc: denied { create } for pid=14087 comm="syz.4.4098" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 566.369936][ T29] audit: type=1400 audit(1725235531.722:11086): avc: denied { search } for pid=4661 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 566.468850][ T29] audit: type=1400 audit(1725235531.722:11087): avc: denied { append } for pid=4661 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 566.558789][ T29] audit: type=1400 audit(1725235531.752:11088): avc: denied { ioctl } for pid=14087 comm="syz.4.4098" path="socket:[35361]" dev="sockfs" ino=35361 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 566.661985][ T29] audit: type=1400 audit(1725235531.762:11089): avc: denied { write } for pid=14087 comm="syz.4.4098" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 566.729799][T14095] option changes via remount are deprecated (pid=14094 comm=syz.0.4100) [ 566.740157][ T29] audit: type=1400 audit(1725235531.762:11090): avc: denied { append open } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 566.814701][T14099] netlink: 'syz.2.4102': attribute type 25 has an invalid length. [ 566.823520][T14096] ALSA: mixer_oss: invalid OSS volume '' [ 566.848834][T14096] ALSA: mixer_oss: invalid OSS volume '' [ 566.862688][T14096] ALSA: mixer_oss: invalid OSS volume 'L' [ 569.635089][T14131] ALSA: seq fatal error: cannot create timer (-19) [ 569.946194][T14143] mkiss: ax0: crc mode is auto. [ 570.940889][ T29] kauditd_printk_skb: 155 callbacks suppressed [ 570.940908][ T29] audit: type=1400 audit(1725235536.673:11246): avc: denied { read write open } for pid=5376 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 571.034195][ T29] audit: type=1400 audit(1725235536.713:11247): avc: denied { read write } for pid=5372 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 571.100439][ T29] audit: type=1400 audit(1725235536.713:11248): avc: denied { read write open } for pid=5372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 571.173768][ T29] audit: type=1400 audit(1725235536.713:11249): avc: denied { ioctl } for pid=5372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=650 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 571.248041][ T29] audit: type=1400 audit(1725235536.713:11250): avc: denied { ioctl } for pid=5376 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=649 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 571.320816][ T29] audit: type=1326 audit(1725235536.723:11251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14157 comm="syz.3.4127" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f9192f79eb9 code=0x0 [ 571.372138][ T29] audit: type=1400 audit(1725235536.803:11252): avc: denied { read write } for pid=5383 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 571.434298][ T29] audit: type=1400 audit(1725235536.803:11253): avc: denied { read write open } for pid=5383 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 571.506578][ T29] audit: type=1400 audit(1725235536.803:11254): avc: denied { ioctl } for pid=5383 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=653 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 571.506650][ T29] audit: type=1400 audit(1725235536.923:11255): avc: denied { read write } for pid=5379 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 576.065544][ T29] kauditd_printk_skb: 174 callbacks suppressed [ 576.065569][ T29] audit: type=1400 audit(1725235541.804:11430): avc: denied { prog_load } for pid=14223 comm="syz.1.4155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 576.129237][ T29] audit: type=1400 audit(1725235541.854:11431): avc: denied { read } for pid=4661 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 576.182188][ T29] audit: type=1400 audit(1725235541.854:11432): avc: denied { search } for pid=4661 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 576.246720][ T29] audit: type=1400 audit(1725235541.854:11433): avc: denied { append } for pid=4661 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 576.309300][ T29] audit: type=1400 audit(1725235541.874:11434): avc: denied { append open } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 576.417517][ T29] audit: type=1400 audit(1725235541.874:11435): avc: denied { getattr } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 576.493032][ T29] audit: type=1400 audit(1725235541.874:11436): avc: denied { bpf } for pid=14223 comm="syz.1.4155" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 576.582971][ T29] audit: type=1400 audit(1725235541.874:11437): avc: denied { perfmon } for pid=14223 comm="syz.1.4155" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 576.657180][ T29] audit: type=1400 audit(1725235541.874:11438): avc: denied { perfmon } for pid=14223 comm="syz.1.4155" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 576.727144][ T29] audit: type=1400 audit(1725235541.894:11439): avc: denied { perfmon } for pid=14223 comm="syz.1.4155" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 577.317531][ T25] usb 4-1: new high-speed USB device number 104 using dummy_hcd [ 577.557422][ T25] usb 4-1: Using ep0 maxpacket: 16 [ 577.612099][ T25] usb 4-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 577.643504][ T25] usb 4-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 577.679094][ T25] usb 4-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 0 [ 577.718434][ T25] usb 4-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 577.738310][T14245] QAT: Stopping all acceleration devices. [ 577.749495][ T25] usb 4-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 0 [ 577.876992][ T25] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 577.886175][ T25] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 577.910627][ T25] usb 4-1: Product: syz [ 577.914842][ T25] usb 4-1: Manufacturer: syz [ 577.935771][ T25] usb 4-1: SerialNumber: syz [ 578.235848][ T25] cdc_ncm 4-1:1.0: bind() failure [ 578.286002][ T25] cdc_ncm 4-1:1.1: CDC Union missing and no IAD found [ 578.318161][ T25] cdc_ncm 4-1:1.1: bind() failure [ 578.368867][ T25] usb 4-1: USB disconnect, device number 104 [ 578.511268][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 578.524763][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 578.537470][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 578.550169][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 578.562974][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 578.575966][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 578.588763][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 578.601478][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 578.614175][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 578.627175][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 580.484928][T14264] mkiss: ax0: crc mode is auto. [ 581.079209][ T29] kauditd_printk_skb: 125 callbacks suppressed [ 581.079228][ T29] audit: type=1400 audit(1725235546.825:11565): avc: denied { read write } for pid=5378 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 581.256388][ T29] audit: type=1400 audit(1725235546.885:11566): avc: denied { read write open } for pid=5378 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 581.414748][ T29] audit: type=1400 audit(1725235546.885:11567): avc: denied { ioctl } for pid=5378 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=652 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 581.566552][ T29] audit: type=1400 audit(1725235547.045:11568): avc: denied { watch } for pid=14268 comm="syz.0.4172" path="/737/file0" dev="tmpfs" ino=3726 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 581.684501][ T29] audit: type=1400 audit(1725235547.075:11569): avc: denied { read } for pid=4661 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 581.778070][ T29] audit: type=1400 audit(1725235547.075:11570): avc: denied { search } for pid=4661 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 581.915286][ T29] audit: type=1400 audit(1725235547.095:11571): avc: denied { append } for pid=4661 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 582.043396][ T29] audit: type=1400 audit(1725235547.095:11572): avc: denied { append open } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 582.165933][ T29] audit: type=1400 audit(1725235547.095:11573): avc: denied { getattr } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 582.297061][ T29] audit: type=1400 audit(1725235547.475:11574): avc: denied { read write } for pid=5376 comm="syz-executor" name="loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 583.280141][T14281] Process accounting resumed [ 583.516012][ C1] net_ratelimit: 8020 callbacks suppressed [ 583.516036][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 583.534585][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 583.547425][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 583.560296][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 583.573065][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 583.585959][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 583.598746][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 583.611513][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 583.624251][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 583.637069][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 586.232140][ T29] kauditd_printk_skb: 42 callbacks suppressed [ 586.232159][ T29] audit: type=1400 audit(1725235551.976:11617): avc: denied { read write } for pid=5379 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 586.333082][ T29] audit: type=1400 audit(1725235552.006:11618): avc: denied { read write open } for pid=5379 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 586.409275][ T29] audit: type=1400 audit(1725235552.016:11619): avc: denied { ioctl } for pid=5379 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=651 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 586.485537][ T29] audit: type=1400 audit(1725235552.036:11620): avc: denied { read } for pid=4661 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 586.552413][ T29] audit: type=1400 audit(1725235552.046:11621): avc: denied { search } for pid=4661 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 586.612751][ T29] audit: type=1400 audit(1725235552.046:11622): avc: denied { append } for pid=4661 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 586.687624][ T29] audit: type=1400 audit(1725235552.056:11623): avc: denied { append open } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 586.762010][ T29] audit: type=1400 audit(1725235552.056:11624): avc: denied { getattr } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 586.822104][ T29] audit: type=1400 audit(1725235552.406:11625): avc: denied { create } for pid=14304 comm="syz.2.4186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 586.886726][ T29] audit: type=1400 audit(1725235552.416:11626): avc: denied { setopt } for pid=14304 comm="syz.2.4186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 588.525607][ C1] net_ratelimit: 9649 callbacks suppressed [ 588.525633][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 588.544280][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 588.557225][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 588.570030][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 588.582778][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 588.595579][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 588.610042][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 588.622798][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 588.635632][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 588.648514][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 589.515505][ T5418] usb 5-1: new high-speed USB device number 104 using dummy_hcd [ 589.726933][ T5418] usb 5-1: Using ep0 maxpacket: 16 [ 589.777523][ T5418] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 589.810164][ T5418] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 589.843775][ T5418] usb 5-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 9 [ 589.888731][ T5418] usb 5-1: New USB device found, idVendor=045e, idProduct=07da, bcdDevice= 0.00 [ 589.920465][ T5418] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 589.997447][ T5418] usb 5-1: config 0 descriptor?? [ 590.603836][ T5418] microsoft 0003:045E:07DA.000B: item 0 4 0 8 parsing failed [ 590.661047][ T5418] microsoft 0003:045E:07DA.000B: parse failed [ 590.708719][ T5418] microsoft 0003:045E:07DA.000B: probe with driver microsoft failed with error -22 [ 591.072125][ T5419] usb 5-1: USB disconnect, device number 104 [ 591.664581][ T29] kauditd_printk_skb: 64 callbacks suppressed [ 591.664602][ T29] audit: type=1400 audit(1725235557.407:11691): avc: denied { create } for pid=14323 comm="syz.1.4193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 591.827925][ T29] audit: type=1400 audit(1725235557.477:11692): avc: denied { bind } for pid=14323 comm="syz.1.4193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 591.934254][ T29] audit: type=1400 audit(1725235557.477:11693): avc: denied { node_bind } for pid=14323 comm="syz.1.4193" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 592.050337][ T29] audit: type=1400 audit(1725235557.497:11694): avc: denied { read } for pid=4661 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 592.184830][ T29] audit: type=1400 audit(1725235557.537:11695): avc: denied { search } for pid=4661 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 592.293884][ T29] audit: type=1400 audit(1725235557.537:11696): avc: denied { append } for pid=4661 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 592.414775][ T29] audit: type=1400 audit(1725235557.567:11697): avc: denied { append open } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 592.504956][ T29] audit: type=1400 audit(1725235557.567:11698): avc: denied { getattr } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 592.594800][ T29] audit: type=1400 audit(1725235557.567:11699): avc: denied { connect } for pid=14323 comm="syz.1.4193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 592.676275][ T29] audit: type=1400 audit(1725235557.767:11700): avc: denied { read write } for pid=5383 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 593.534253][ C1] net_ratelimit: 8144 callbacks suppressed [ 593.534275][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 593.552856][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 593.565630][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 593.578381][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 593.591204][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 593.603989][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 593.616673][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 593.630388][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 593.643334][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 593.656095][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 596.895952][ T29] kauditd_printk_skb: 47 callbacks suppressed [ 596.895972][ T29] audit: type=1400 audit(1725235562.647:11748): avc: denied { read write } for pid=5379 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 597.165332][ T29] audit: type=1400 audit(1725235562.677:11749): avc: denied { read write } for pid=5383 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 597.379711][ T29] audit: type=1400 audit(1725235562.697:11750): avc: denied { read write open } for pid=5379 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 597.564023][ T29] audit: type=1400 audit(1725235562.697:11751): avc: denied { ioctl } for pid=5379 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=651 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 597.785518][T14344] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 597.804419][T14344] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 597.813061][T14344] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 597.825208][T14344] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 597.847626][T14344] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 597.858807][T14344] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 597.873760][ T29] audit: type=1400 audit(1725235562.737:11752): avc: denied { read write open } for pid=5383 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 598.152857][ T29] audit: type=1400 audit(1725235562.737:11753): avc: denied { ioctl } for pid=5383 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=653 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 598.250777][ T5374] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 598.265633][ T5374] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 598.274214][ T5374] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 598.313630][ T5374] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 598.324133][ T5374] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 598.343789][ T5374] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 598.543536][ T29] audit: type=1400 audit(1725235562.757:11754): avc: denied { read } for pid=4661 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 598.543834][ C1] net_ratelimit: 8159 callbacks suppressed [ 598.543852][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 598.584260][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 598.597024][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 598.609774][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 598.622577][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 598.635409][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 598.648152][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 598.660993][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 598.673827][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 598.686698][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 598.818050][ T29] audit: type=1400 audit(1725235562.757:11755): avc: denied { search } for pid=4661 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 599.033455][ T29] audit: type=1400 audit(1725235562.757:11756): avc: denied { append } for pid=4661 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 599.153468][ T29] audit: type=1400 audit(1725235562.827:11757): avc: denied { append open } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 600.113991][ T5374] Bluetooth: hci1: command tx timeout [ 600.210008][ T1168] IPVS: starting estimator thread 0... [ 600.333584][T14365] IPVS: using max 16 ests per chain, 38400 per kthread [ 600.505387][ T5374] Bluetooth: hci2: command tx timeout [ 601.719745][ T1168] usb 2-1: new high-speed USB device number 103 using dummy_hcd [ 601.933386][ T1168] usb 2-1: Using ep0 maxpacket: 32 [ 601.944940][ T29] kauditd_printk_skb: 112 callbacks suppressed [ 601.945028][ T29] audit: type=1326 audit(1725235567.688:11870): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14372 comm="syz.1.4211" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fedc6d79abb code=0x7ffc0000 [ 602.040779][ T1168] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 602.086139][ T1168] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 602.116748][ T29] audit: type=1400 audit(1725235567.698:11871): avc: denied { ioctl } for pid=14372 comm="syz.1.4211" path="/dev/raw-gadget" dev="devtmpfs" ino=734 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 602.166763][ T1168] usb 2-1: New USB device found, idVendor=1e71, idProduct=200f, bcdDevice= 0.00 [ 602.212304][ T5374] Bluetooth: hci1: command tx timeout [ 602.222432][ T1168] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 602.272875][ T29] audit: type=1326 audit(1725235567.748:11872): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14372 comm="syz.1.4211" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fedc6d79abb code=0x7ffc0000 [ 602.365684][ T1168] usb 2-1: config 0 descriptor?? [ 602.457282][ T29] audit: type=1400 audit(1725235567.748:11873): avc: denied { ioctl } for pid=14372 comm="syz.1.4211" path="/dev/raw-gadget" dev="devtmpfs" ino=734 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 602.499138][ T1303] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 602.595543][ T5374] Bluetooth: hci2: command tx timeout [ 602.635388][ T29] audit: type=1326 audit(1725235567.748:11874): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14372 comm="syz.1.4211" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fedc6d79abb code=0x7ffc0000 [ 602.811291][ T1168] usbhid 2-1:0.0: can't add hid device: -71 [ 602.853926][ T29] audit: type=1400 audit(1725235567.748:11875): avc: denied { ioctl } for pid=14372 comm="syz.1.4211" path="/dev/raw-gadget" dev="devtmpfs" ino=734 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 602.882855][ T1168] usbhid 2-1:0.0: probe with driver usbhid failed with error -71 [ 603.023317][ T1168] usb 2-1: USB disconnect, device number 103 [ 603.054334][T14343] wg0 speed is unknown, defaulting to 1000 [ 603.148049][ T29] audit: type=1400 audit(1725235567.758:11876): avc: denied { read write } for pid=5383 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 603.348760][ T29] audit: type=1326 audit(1725235567.778:11877): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14372 comm="syz.1.4211" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fedc6d79abb code=0x7ffc0000 [ 603.528420][ T29] audit: type=1400 audit(1725235567.788:11878): avc: denied { ioctl } for pid=14372 comm="syz.1.4211" path="/dev/raw-gadget" dev="devtmpfs" ino=734 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 603.552667][ C1] net_ratelimit: 8174 callbacks suppressed [ 603.552689][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 603.572016][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 603.585039][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 603.597927][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 603.610664][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 603.623484][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 603.636324][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 603.649621][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 603.662370][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 603.675110][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 603.685306][ T29] audit: type=1326 audit(1725235567.788:11879): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14372 comm="syz.1.4211" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fedc6d79abb code=0x7ffc0000 [ 604.262922][ T5374] Bluetooth: hci1: command tx timeout [ 604.662702][ T5374] Bluetooth: hci2: command tx timeout [ 605.333194][T14386] input: syz0 as /devices/virtual/input/input43 [ 605.890603][T14389] Process accounting resumed [ 605.906718][T14389] kernel write not supported for file /1674/clear_refs (pid: 14389 comm: syz.4.4217) [ 606.342740][ T5374] Bluetooth: hci1: command tx timeout [ 606.742697][ T5374] Bluetooth: hci2: command tx timeout [ 607.275011][ T1303] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 607.378158][ T29] kauditd_printk_skb: 128 callbacks suppressed [ 607.378179][ T29] audit: type=1400 audit(1725235573.119:12008): avc: denied { read } for pid=4661 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 607.469789][T14348] wg0 speed is unknown, defaulting to 1000 [ 607.579836][ T29] audit: type=1400 audit(1725235573.179:12010): avc: denied { search } for pid=4661 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 607.731865][ T29] audit: type=1400 audit(1725235573.179:12011): avc: denied { append } for pid=4661 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 607.871103][ T29] audit: type=1400 audit(1725235573.179:12012): avc: denied { append open } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 607.871174][ T29] audit: type=1400 audit(1725235573.179:12013): avc: denied { getattr } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 607.871235][ T29] audit: type=1400 audit(1725235573.159:12009): avc: denied { read write } for pid=5372 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 607.871295][ T29] audit: type=1400 audit(1725235573.219:12014): avc: denied { read write open } for pid=5372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 607.871358][ T29] audit: type=1400 audit(1725235573.219:12015): avc: denied { ioctl } for pid=5372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=650 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 608.307362][ T29] audit: type=1400 audit(1725235574.029:12016): avc: denied { read write } for pid=5379 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 608.309660][ T29] audit: type=1400 audit(1725235574.049:12017): avc: denied { read write open } for pid=5379 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 608.562119][ C1] net_ratelimit: 8147 callbacks suppressed [ 608.562144][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 608.562732][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 608.563369][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 608.563958][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 608.564536][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 608.565145][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 608.565717][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 608.566481][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 608.567076][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 608.567662][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 613.571259][ C0] net_ratelimit: 15143 callbacks suppressed [ 613.571284][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 613.571317][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 613.571902][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 613.571923][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 613.572527][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 613.572618][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 613.573142][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 613.573225][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 613.573756][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 613.573837][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 614.638999][ T29] kauditd_printk_skb: 17 callbacks suppressed [ 614.639021][ T29] audit: type=1400 audit(1725235580.320:12035): avc: denied { read } for pid=4661 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 614.639084][ T29] audit: type=1400 audit(1725235580.320:12036): avc: denied { search } for pid=4661 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 614.639151][ T29] audit: type=1400 audit(1725235580.320:12037): avc: denied { append } for pid=4661 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 614.693584][ T29] audit: type=1400 audit(1725235580.440:12038): avc: denied { read write } for pid=5379 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 614.995907][ T29] audit: type=1400 audit(1725235580.730:12039): avc: denied { read write open } for pid=5379 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 615.073335][ T29] audit: type=1400 audit(1725235580.760:12040): avc: denied { ioctl } for pid=5379 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=651 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 616.754415][ T29] audit: type=1400 audit(1725235582.481:12041): avc: denied { append open } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 616.859980][ T29] audit: type=1400 audit(1725235582.511:12042): avc: denied { getattr } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 618.580208][ C0] net_ratelimit: 15447 callbacks suppressed [ 618.580233][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 618.580897][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 618.580942][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 618.581558][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 618.581611][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 618.582171][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 618.582330][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 618.582836][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 618.583109][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 618.583444][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 621.667180][ T5483] kworker/1:7 (5483) used greatest stack depth: 20976 bytes left [ 623.589664][ C0] net_ratelimit: 15681 callbacks suppressed [ 623.589689][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 623.589808][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 623.590325][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 623.590634][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 623.590897][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 623.591305][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 623.591525][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 623.591966][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 623.592126][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 623.592593][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 624.168964][ T1303] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 625.082050][ T1267] ieee802154 phy0 wpan0: encryption failed: -22 [ 625.100543][ T1267] ieee802154 phy1 wpan1: encryption failed: -22 [ 628.598745][ C0] net_ratelimit: 16367 callbacks suppressed [ 628.598771][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 628.599333][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 628.599361][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 628.599950][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 628.599951][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 628.600546][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 628.600625][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 628.601163][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 628.601240][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 628.601797][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 631.295359][ T29] audit: type=1400 audit(1725235597.023:12043): avc: denied { read } for pid=14403 comm="syz.1.4223" dev="nsfs" ino=4026532976 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 632.490106][ T29] audit: type=1400 audit(1725235598.243:12044): avc: denied { read open } for pid=14403 comm="syz.1.4223" path="net:[4026532976]" dev="nsfs" ino=4026532976 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 633.607967][ C0] net_ratelimit: 11395 callbacks suppressed [ 633.607998][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 633.608670][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 633.609344][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 633.609356][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 633.610002][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 633.610637][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 633.611268][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 633.611682][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 633.611938][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 633.612578][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 638.616995][ C1] net_ratelimit: 10588 callbacks suppressed [ 638.617021][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 638.617412][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 638.618071][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 638.618723][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 638.619256][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 638.619461][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 638.620135][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 638.620777][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 638.621404][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 638.621428][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 643.626328][ C0] net_ratelimit: 10421 callbacks suppressed [ 643.626353][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 643.626958][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 643.627445][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 643.627552][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 643.628152][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 643.628769][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 643.629427][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 643.629603][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 643.630027][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 643.630663][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 647.597828][ T29] audit: type=1400 audit(1725235613.326:12045): avc: denied { read } for pid=4661 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 647.597906][ T29] audit: type=1400 audit(1725235613.326:12046): avc: denied { search } for pid=4661 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 648.571702][ T29] audit: type=1400 audit(1725235614.266:12047): avc: denied { append } for pid=4661 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 648.635530][ C0] net_ratelimit: 10063 callbacks suppressed [ 648.635555][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 648.636155][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 648.636759][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 648.637014][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 648.637348][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 648.637982][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 648.638639][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 648.639138][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 648.639234][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 648.639835][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 649.574233][ T29] audit: type=1400 audit(1725235615.326:12048): avc: denied { append open } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 650.077371][ T29] audit: type=1400 audit(1725235615.806:12049): avc: denied { getattr } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 650.330540][ T29] audit: type=1400 audit(1725235616.086:12050): avc: denied { read } for pid=4661 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 650.739809][ T29] audit: type=1400 audit(1725235616.436:12051): avc: denied { search } for pid=4661 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 650.739885][ T29] audit: type=1400 audit(1725235616.466:12052): avc: denied { append } for pid=4661 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 650.739946][ T29] audit: type=1400 audit(1725235616.466:12053): avc: denied { append open } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 650.740004][ T29] audit: type=1400 audit(1725235616.466:12054): avc: denied { getattr } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 653.644742][ C0] net_ratelimit: 9681 callbacks suppressed [ 653.644768][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 653.645370][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 653.645525][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 653.645981][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 653.646625][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 653.647226][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 653.647597][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 653.647874][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 653.648471][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 653.649073][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 658.654165][ C0] net_ratelimit: 10376 callbacks suppressed [ 658.654191][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 658.654784][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 658.654889][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 658.655385][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 658.656007][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 658.656608][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 658.657054][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 658.657213][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 658.657839][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 658.658439][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 662.618686][ T29] audit: type=1400 audit(1725235628.318:12055): avc: denied { read } for pid=4661 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 662.618762][ T29] audit: type=1400 audit(1725235628.348:12056): avc: denied { search } for pid=4661 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 662.618832][ T29] audit: type=1400 audit(1725235628.348:12057): avc: denied { append } for pid=4661 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 663.663202][ C0] net_ratelimit: 10074 callbacks suppressed [ 663.663228][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 663.664028][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 663.664122][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 663.664875][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 663.665538][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 663.666254][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 663.666289][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 663.667159][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 663.667821][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 663.668360][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 665.335064][ T29] audit: type=1400 audit(1725235631.029:12058): avc: denied { append open } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 665.335138][ T29] audit: type=1400 audit(1725235631.059:12059): avc: denied { getattr } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 668.672318][ C0] net_ratelimit: 9891 callbacks suppressed [ 668.672344][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 668.672945][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 668.673079][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 668.673607][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 668.674329][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 668.674877][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 668.675188][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 668.675512][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 668.676262][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 668.676812][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 670.165200][ T29] audit: type=1400 audit(1725235635.889:12060): avc: denied { read } for pid=4661 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 670.575039][ T29] audit: type=1400 audit(1725235636.269:12061): avc: denied { search } for pid=4661 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 670.575110][ T29] audit: type=1400 audit(1725235636.299:12062): avc: denied { append } for pid=4661 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 670.575169][ T29] audit: type=1400 audit(1725235636.299:12063): avc: denied { append open } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 670.575230][ T29] audit: type=1400 audit(1725235636.299:12064): avc: denied { getattr } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 671.374736][ T29] audit: type=1400 audit(1725235637.070:12065): avc: denied { read } for pid=4661 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 671.374812][ T29] audit: type=1400 audit(1725235637.070:12066): avc: denied { read } for pid=4661 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 671.374873][ T29] audit: type=1400 audit(1725235637.100:12067): avc: denied { search } for pid=4661 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 671.374932][ T29] audit: type=1400 audit(1725235637.100:12068): avc: denied { append } for pid=4661 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 671.374992][ T29] audit: type=1400 audit(1725235637.100:12069): avc: denied { append open } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 673.681601][ C0] net_ratelimit: 9869 callbacks suppressed [ 673.681631][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 673.682151][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 673.682769][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 673.683568][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 673.684110][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 673.684724][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 673.685436][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 673.685972][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 673.686579][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 673.687273][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 677.655397][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 677.655421][ T29] audit: type=1400 audit(1725235643.411:12071): avc: denied { read } for pid=4661 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 678.681872][ T29] audit: type=1400 audit(1725235644.361:12072): avc: denied { search } for pid=4661 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 678.681956][ T29] audit: type=1400 audit(1725235644.361:12073): avc: denied { append } for pid=4661 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 678.690570][ C0] net_ratelimit: 10297 callbacks suppressed [ 678.690594][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 678.691276][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 678.691832][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 678.692244][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 678.692423][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 678.693111][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 678.693633][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 678.694233][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 678.694472][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 678.694914][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 683.699759][ C0] net_ratelimit: 10453 callbacks suppressed [ 683.699785][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 683.700192][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 683.700478][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 683.701006][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 683.701654][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 683.702375][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 683.702423][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 683.702895][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 683.703503][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 683.704211][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 684.986737][ T29] audit: type=1400 audit(1725235650.682:12074): avc: denied { append open } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 686.228745][ T1267] ieee802154 phy0 wpan0: encryption failed: -22 [ 686.246747][ T1267] ieee802154 phy1 wpan1: encryption failed: -22 [ 688.709389][ C1] net_ratelimit: 10533 callbacks suppressed [ 688.709414][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 688.710558][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 688.711084][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 688.711547][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 688.711710][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 688.712414][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 688.712955][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 688.713550][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 688.713842][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 688.714226][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 691.339558][ T29] audit: type=1400 audit(1725235656.873:12075): avc: denied { getattr } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 693.717967][ C0] net_ratelimit: 10417 callbacks suppressed [ 693.717992][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 693.718628][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 693.719309][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 693.719829][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 693.720042][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 693.720429][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 693.721123][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 693.721650][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 693.722198][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 693.722280][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 698.727089][ C0] net_ratelimit: 10836 callbacks suppressed [ 698.727115][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 698.727717][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 698.728425][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 698.728947][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 698.729223][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 698.729568][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 698.730269][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 698.730792][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 698.731385][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 698.731402][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 703.736354][ C0] net_ratelimit: 10709 callbacks suppressed [ 703.736378][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 703.737060][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 703.737578][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 703.737945][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 703.738183][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 703.738901][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 703.739474][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 703.740019][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 703.740072][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 703.740749][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 708.139749][ T29] audit: type=1400 audit(1725235673.846:12076): avc: denied { read } for pid=4661 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 708.139823][ T29] audit: type=1400 audit(1725235673.846:12077): avc: denied { search } for pid=4661 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 708.139884][ T29] audit: type=1400 audit(1725235673.846:12078): avc: denied { append } for pid=4661 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 708.745589][ C0] net_ratelimit: 9572 callbacks suppressed [ 708.745615][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 708.746337][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 708.746893][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 708.747499][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 708.747788][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 708.748180][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 708.748710][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 708.749318][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 708.750030][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 708.750334][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 713.755088][ C0] net_ratelimit: 10503 callbacks suppressed [ 713.755113][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 713.755280][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 713.755743][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 713.756459][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 713.756989][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 713.757590][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 713.757825][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 713.758304][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 713.758863][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 713.759465][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 715.230850][ T29] audit: type=1400 audit(1725235680.997:12079): avc: denied { append open } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 718.764462][ C0] net_ratelimit: 9735 callbacks suppressed [ 718.764486][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 718.765189][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 718.765754][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 718.765883][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 718.766368][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 718.767049][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 718.767581][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 718.768133][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 718.768213][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 718.768935][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 723.773039][ C0] net_ratelimit: 10612 callbacks suppressed [ 723.773064][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 723.773682][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 723.773899][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 723.774363][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 723.774930][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 723.775572][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 723.776247][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 723.776624][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 723.776889][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 723.777503][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 727.460068][T14344] Bluetooth: hci1: command 0x0406 tx timeout [ 727.460176][T14344] Bluetooth: hci2: command tx timeout [ 728.273997][ T29] audit: type=1400 audit(1725235693.979:12080): avc: denied { getattr } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 728.782848][ C0] net_ratelimit: 9890 callbacks suppressed [ 728.782873][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 728.783590][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 728.784400][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 728.785009][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 728.785342][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 728.786037][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 728.786845][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 728.787180][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 728.789386][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 728.791555][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 732.705316][ T29] audit: type=1400 audit(1725235698.469:12081): avc: denied { read } for pid=4661 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 733.074909][ T29] audit: type=1400 audit(1725235698.780:12082): avc: denied { search } for pid=4661 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 733.074982][ T29] audit: type=1400 audit(1725235698.810:12083): avc: denied { append } for pid=4661 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 733.791537][ C1] net_ratelimit: 9582 callbacks suppressed [ 733.791563][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 733.791823][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 733.792479][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 733.793175][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 733.793643][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 733.793716][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 733.794329][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 733.795062][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 733.795603][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 733.795784][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 737.626156][ T29] audit: type=1400 audit(1725235703.360:12084): avc: denied { append open } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 738.800699][ C0] net_ratelimit: 9801 callbacks suppressed [ 738.800723][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 738.801406][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 738.801964][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 738.802176][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 738.802557][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 738.803270][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 738.803789][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 738.804348][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 738.804382][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 738.805185][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 741.454962][ T29] audit: type=1400 audit(1725235707.191:12085): avc: denied { getattr } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 743.809936][ C0] net_ratelimit: 9987 callbacks suppressed [ 743.809961][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 743.810694][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 743.811086][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 743.811223][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 743.811832][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 743.812523][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 743.813082][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 743.813186][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 743.813698][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 743.814411][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 744.833973][ T29] audit: type=1400 audit(1725235710.571:12086): avc: denied { read } for pid=4661 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 744.834048][ T29] audit: type=1400 audit(1725235710.571:12087): avc: denied { search } for pid=4661 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 744.834111][ T29] audit: type=1400 audit(1725235710.571:12088): avc: denied { append } for pid=4661 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 746.104380][ T29] audit: type=1400 audit(1725235711.862:12089): avc: denied { append open } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 746.143508][ T29] audit: type=1400 audit(1725235711.892:12090): avc: denied { getattr } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 746.165977][ T29] audit: type=1400 audit(1725235711.922:12091): avc: denied { read } for pid=4661 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 747.053881][ T29] audit: type=1400 audit(1725235712.802:12092): avc: denied { search } for pid=4661 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 747.053954][ T29] audit: type=1400 audit(1725235712.802:12093): avc: denied { append } for pid=4661 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 747.105229][ T29] audit: type=1400 audit(1725235712.832:12094): avc: denied { append open } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 748.029939][ T29] audit: type=1400 audit(1725235713.202:12095): avc: denied { getattr } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 748.819476][ C0] net_ratelimit: 9683 callbacks suppressed [ 748.819502][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 748.819756][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 748.820052][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 748.820670][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 748.821407][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 748.821916][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 748.821925][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 748.822512][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 748.823176][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 748.823754][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 748.858199][ T1267] ieee802154 phy0 wpan0: encryption failed: -22 [ 748.876570][ T1267] ieee802154 phy1 wpan1: encryption failed: -22 [ 753.828277][ C0] net_ratelimit: 10259 callbacks suppressed [ 753.828300][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 753.828891][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 753.829020][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 753.829587][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 753.830131][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 753.830723][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 753.831171][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 753.831389][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 753.831901][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 753.832489][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 758.837990][ C0] net_ratelimit: 9505 callbacks suppressed [ 758.838014][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 758.838820][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 758.839329][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 758.839479][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 758.840199][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 758.840998][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 758.841481][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 758.841623][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 758.842369][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 758.843202][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 762.922317][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 762.922338][ T29] audit: type=1400 audit(1725235728.664:12099): avc: denied { append open } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 763.387995][ T29] audit: type=1400 audit(1725235729.134:12100): avc: denied { execmem } for pid=14413 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 763.846599][ C1] net_ratelimit: 9847 callbacks suppressed [ 763.846624][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 763.847080][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 763.847877][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 763.848527][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 763.848878][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 763.849241][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 763.850046][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 763.850669][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 763.850964][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 763.851385][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 764.499907][ T29] audit: type=1400 audit(1725235730.215:12101): avc: denied { getattr } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 765.840695][ T29] audit: type=1400 audit(1725235731.455:12102): avc: denied { read } for pid=4661 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 765.840771][ T29] audit: type=1400 audit(1725235731.485:12103): avc: denied { search } for pid=4661 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 765.840833][ T29] audit: type=1400 audit(1725235731.485:12104): avc: denied { append } for pid=4661 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 766.592263][ T29] audit: type=1400 audit(1725235732.365:12105): avc: denied { append open } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 767.745883][ T1303] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 768.856310][ C0] net_ratelimit: 9392 callbacks suppressed [ 768.856335][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 768.857114][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 768.857510][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 768.858001][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 768.858685][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 768.859454][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 768.859683][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 768.861774][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 768.863835][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 768.865937][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:e8:b9:88:f1:a2, vlan:0) [ 768.894859][ T29] audit: type=1400 audit(1725235734.665:12106): avc: denied { getattr } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 769.507708][ T29] audit: type=1400 audit(1725235735.225:12107): avc: denied { read } for pid=4661 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 769.507783][ T29] audit: type=1400 audit(1725235735.255:12108): avc: denied { search } for pid=4661 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 769.507844][ T29] audit: type=1400 audit(1725235735.255:12109): avc: denied { append } for pid=4661 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 769.507904][ T29] audit: type=1400 audit(1725235735.255:12110): avc: denied { append open } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 770.349545][ T29] audit: type=1400 audit(1725235736.065:12111): avc: denied { getattr } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 770.349623][ T29] audit: type=1400 audit(1725235736.095:12112): avc: denied { read } for pid=4661 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 770.349685][ T29] audit: type=1400 audit(1725235736.095:12113): avc: denied { search } for pid=4661 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 770.349745][ T29] audit: type=1400 audit(1725235736.095:12114): avc: denied { append } for pid=4661 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 770.693296][ T29] audit: type=1400 audit(1725235736.466:12115): avc: denied { append open } for pid=4661 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 771.141229][ T30] INFO: task syz.4.4220:14396 blocked for more than 143 seconds. [ 771.141278][ T30] Not tainted 6.11.0-rc6-syzkaller-00017-gc9f016e72b5c #0 [ 771.141295][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 771.141307][ T30] task:syz.4.4220 state:D stack:28752 pid:14396 tgid:14394 ppid:5383 flags:0x00000004 [ 771.141357][ T30] Call Trace: [ 771.141367][ T30] [ 771.141384][ T30] __schedule+0xe37/0x5490 [ 771.141421][ T30] ? __pfx___lock_acquire+0x10/0x10 [ 771.141458][ T30] ? mark_lock+0xb5/0xc60 [ 771.141490][ T30] ? mark_lock+0xb5/0xc60 [ 771.141538][ T30] ? __pfx___schedule+0x10/0x10 [ 771.141572][ T30] ? schedule+0x298/0x350 [ 771.141604][ T30] ? __pfx_lock_release+0x10/0x10 [ 771.141646][ T30] ? hlock_class+0x4e/0x130 [ 771.141681][ T30] schedule+0xe7/0x350 [ 771.141715][ T30] schedule_timeout+0x258/0x2a0 [ 771.141747][ T30] ? __pfx_schedule_timeout+0x10/0x10 [ 771.141793][ T30] ? _raw_spin_unlock_irq+0x23/0x50 [ 771.141829][ T30] __down_common+0x32d/0x730 [ 771.141876][ T30] ? __pfx___down_common+0x10/0x10 [ 771.141932][ T30] down+0x74/0xa0 [ 771.141967][ T30] console_lock+0x5b/0xa0 [ 771.141992][ T30] tioclinux+0x49f/0x5f0 [ 771.142027][ T30] vt_ioctl+0x2eb5/0x2f80 [ 771.142069][ T30] ? __pfx_vt_ioctl+0x10/0x10 [ 771.142104][ T30] ? kfree+0x12a/0x3b0 [ 771.142155][ T30] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 771.142187][ T30] ? do_vfs_ioctl+0x515/0x1ad0 [ 771.142224][ T30] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 771.142262][ T30] ? tty_jobctrl_ioctl+0x152/0xe00 [ 771.142298][ T30] ? __pfx_vt_ioctl+0x10/0x10 [ 771.142335][ T30] tty_ioctl+0x65d/0x15f0 [ 771.142366][ T30] ? ioctl_has_perm.constprop.0.isra.0+0x2f0/0x470 [ 771.142402][ T30] ? __pfx_tty_ioctl+0x10/0x10 [ 771.142431][ T30] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 771.142471][ T30] ? find_held_lock+0x2d/0x110 [ 771.142517][ T30] ? selinux_file_ioctl+0x180/0x270 [ 771.142548][ T30] ? selinux_file_ioctl+0xb4/0x270 [ 771.142582][ T30] ? bpf_lsm_file_ioctl+0x9/0x10 [ 771.142619][ T30] ? __pfx_tty_ioctl+0x10/0x10 [ 771.142651][ T30] __x64_sys_ioctl+0x193/0x220 [ 771.142692][ T30] do_syscall_64+0xcd/0x250 [ 771.142730][ T30] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 771.142759][ T30] RIP: 0033:0x7f454eb79eb9 [ 771.142789][ T30] RSP: 002b:00007f454f983038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 771.142818][ T30] RAX: ffffffffffffffda RBX: 00007f454ed16058 RCX: 00007f454eb79eb9 [ 771.142837][ T30] RDX: 0000000020001040 RSI: 000000000000541c RDI: 0000000000000003 [ 771.142856][ T30] RBP: 00007f454ebe793e R08: 0000000000000000 R09: 0000000000000000 [ 771.142875][ T30] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 771.142893][ T30] R13: 0000000000000001 R14: 00007f454ed16058 R15: 00007ffe34413468 [ 771.142931][ T30] [ 771.142950][ T30] [ 771.142950][ T30] Showing all locks held in the system: [ 771.142964][ T30] 1 lock held by khungtaskd/30: [ 771.142981][ T30] #0: ffffffff8ddb9fe0 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x75/0x340 [ 771.143058][ T30] 6 locks held by kworker/u8:6/1303: [ 771.143075][ T30] #0: ffff88801bae3148 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x1277/0x1b40 [ 771.143153][ T30] #1: ffffc900049f7d80 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x921/0x1b40 [ 771.143227][ T30] #2: ffffffff8fa1fbd0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xbb/0xbb0 [ 771.143299][ T30] #3: ffff888061dd30e8 (&dev->mutex){....}-{3:3}, at: devlink_pernet_pre_exit+0x12d/0x2b0 [ 771.143372][ T30] #4: ffff888061dd7250 (&devlink->lock_key#5){+.+.}-{3:3}, at: devlink_pernet_pre_exit+0x137/0x2b0 [ 771.143452][ T30] #5: ffffffff8fa355e8 (rtnl_mutex){+.+.}-{3:3}, at: nsim_destroy+0x6f/0x6a0 [ 771.143533][ T30] 3 locks held by dhcpcd/4893: [ 771.143551][ T30] 2 locks held by getty/4983: [ 771.143567][ T30] #0: ffff888030bc30a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 [ 771.143632][ T30] #1: ffffc90002f062f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0xfc8/0x1490 [ 771.143706][ T30] 3 locks held by syz-executor/5217: [ 771.143725][ T30] 1 lock held by syz-executor/5379: [ 771.143742][ T30] #0: ffffffff8ddc5778 (rcu_state.exp_mutex){+.+.}-{3:3}, at: exp_funnel_lock+0x1a4/0x3b0 [ 771.143809][ T30] 2 locks held by syz-executor/5383: [ 771.143832][ T30] 1 lock held by syz-executor/14343: [ 771.143849][ T30] #0: ffffffff8fa355e8 (rtnl_mutex){+.+.}-{3:3}, at: __tun_chr_ioctl+0x4fc/0x4770 [ 771.143918][ T30] 2 locks held by syz-executor/14348: [ 771.143934][ T30] #0: ffffffff8fa1fbd0 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x2d6/0x700 [ 771.143999][ T30] #1: ffffffff8fa355e8 (rtnl_mutex){+.+.}-{3:3}, at: ip_tunnel_init_net+0x218/0x780 [ 771.144074][ T30] 6 locks held by syz.4.4220/14395: [ 771.144091][ T30] 1 lock held by syz.1.4221/14400: [ 771.144108][ T30] #0: ffffffff8fa355e8 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3e/0x230 [ 771.144173][ T30] 3 locks held by kworker/u8:2/14408: [ 771.144190][ T30] #0: ffff88801ac89148 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x1277/0x1b40 [ 771.144272][ T30] #1: ffffc90009397d80 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x921/0x1b40 [ 771.144347][ T30] #2: ffffffff8fa355e8 (rtnl_mutex){+.+.}-{3:3}, at: linkwatch_event+0x51/0xc0 [ 771.144413][ T30] 3 locks held by kworker/u8:5/14410: [ 771.144430][ T30] #0: ffff8880300a1148 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x1277/0x1b40 [ 771.144506][ T30] #1: ffffc9000a37fd80 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_one_work+0x921/0x1b40 [ 771.144584][ T30] #2: ffffffff8fa355e8 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0x12/0x30 [ 771.144656][ T30] 3 locks held by syz-executor/14413: [ 771.144674][ T30] 3 locks held by kworker/1:2/14414: [ 771.144691][ T30] 3 locks held by kworker/u8:8/14415: [ 771.144708][ T30] 2 locks held by dhcpcd/14417: [ 771.144724][ T30] #0: ffff888026014258 (sk_lock-AF_PACKET){+.+.}-{0:0}, at: packet_do_bind+0x2c/0xf60 [ 771.144798][ T30] #1: ffffffff8ddc5778 (rcu_state.exp_mutex){+.+.}-{3:3}, at: exp_funnel_lock+0x1a4/0x3b0 [ 771.144865][ T30] 1 lock held by dhcpcd/14421: [ 771.144882][ T30] #0: ffff88807ed7a258 (sk_lock-AF_PACKET){+.+.}-{0:0}, at: packet_do_bind+0x2c/0xf60 [ 771.144955][ T30] [ 771.144963][ T30] ============================================= [ 771.144963][ T30] [ 771.144979][ T30] NMI backtrace for cpu 0 [ 771.144991][ T30] CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted 6.11.0-rc6-syzkaller-00017-gc9f016e72b5c #0 [ 771.145021][ T30] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 771.145036][ T30] Call Trace: [ 771.145046][ T30] [ 771.145057][ T30] dump_stack_lvl+0x116/0x1f0 [ 771.145087][ T30] nmi_cpu_backtrace+0x27b/0x390 [ 771.145124][ T30] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 771.145160][ T30] nmi_trigger_cpumask_backtrace+0x29c/0x300 [ 771.145198][ T30] watchdog+0xf0c/0x1240 [ 771.145229][ T30] ? __pfx_watchdog+0x10/0x10 [ 771.145257][ T30] ? lockdep_hardirqs_on+0x7c/0x110 [ 771.145292][ T30] ? __kthread_parkme+0x148/0x220 [ 771.145325][ T30] ? __pfx_watchdog+0x10/0x10 [ 771.145350][ T30] kthread+0x2c1/0x3a0 [ 771.145379][ T30] ? _raw_spin_unlock_irq+0x23/0x50 [ 771.145406][ T30] ? __pfx_kthread+0x10/0x10 [ 771.145432][ T30] ret_from_fork+0x45/0x80 [ 771.145467][ T30] ? __pfx_kthread+0x10/0x10 [ 771.145495][ T30] ret_from_fork_asm+0x1a/0x30 [ 771.145545][ T30] [ 771.164652][ T30] Sending NMI from CPU 0 to CPUs 1: [ 771.164702][ C1] NMI backtrace for cpu 1 [ 771.164715][ C1] CPU: 1 UID: 0 PID: 14415 Comm: kworker/u8:8 Not tainted 6.11.0-rc6-syzkaller-00017-gc9f016e72b5c #0 [ 771.164744][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 771.164759][ C1] Workqueue: bat_events batadv_tt_purge [ 771.164796][ C1] RIP: 0010:unwind_next_frame+0x2a0/0x23a0 [ 771.164822][ C1] Code: 7c 09 84 d2 74 05 e8 4f a1 ad 00 42 8b 04 b5 5c 6c 5d 91 41 83 c5 01 4a 8d 3c ad 5c 6c 5d 91 48 89 fa 48 c1 ea 03 89 44 24 28 <48> b8 00 00 00 00 00 fc ff df 0f b6 14 02 48 89 f8 83 e0 07 83 c0 [ 771.164844][ C1] RSP: 0018:ffffc90000a179f0 EFLAGS: 00000a07 [ 771.164867][ C1] RAX: 00000000001b17f2 RBX: ffffc90000a17a70 RCX: ffffffff813ce13d [ 771.164883][ C1] RDX: 1ffffffff23023fc RSI: ffffffff813ce14b RDI: ffffffff91811fe4 [ 771.164900][ C1] RBP: 0000000000000002 R08: 0000000000000004 R09: 000000000008ece1 [ 771.164915][ C1] R10: 00000000000a4000 R11: dffffc0000000000 R12: ffffffff89ece1b2 [ 771.164931][ C1] R13: 000000000008ece2 R14: 000000000008ece1 R15: ffffc90000a17aa5 [ 771.164947][ C1] FS: 0000000000000000(0000) GS:ffff8880b8900000(0000) knlGS:0000000000000000 [ 771.164970][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 771.164987][ C1] CR2: 000055c6fda77498 CR3: 000000000db7c000 CR4: 00000000003506f0 [ 771.165009][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 771.165024][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 771.165039][ C1] Call Trace: [ 771.165047][ C1] [ 771.165057][ C1] ? show_regs+0x8c/0xa0 [ 771.165090][ C1] ? nmi_cpu_backtrace+0x1d8/0x390 [ 771.165122][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 771.165153][ C1] ? nmi_handle+0x1a9/0x5c0 [ 771.165175][ C1] ? unwind_next_frame+0x2a0/0x23a0 [ 771.165198][ C1] ? default_do_nmi+0x6a/0x160 [ 771.165223][ C1] ? exc_nmi+0x170/0x1e0 [ 771.165246][ C1] ? end_repeat_nmi+0xf/0x53 [ 771.165272][ C1] ? br_nf_hook_thresh+0x302/0x410 [ 771.165298][ C1] ? unwind_next_frame+0x23d/0x23a0 [ 771.165320][ C1] ? unwind_next_frame+0x24b/0x23a0 [ 771.165343][ C1] ? unwind_next_frame+0x2a0/0x23a0 [ 771.165366][ C1] ? unwind_next_frame+0x2a0/0x23a0 [ 771.165391][ C1] ? unwind_next_frame+0x2a0/0x23a0 [ 771.165412][ C1] [ 771.165419][ C1] [ 771.165427][ C1] ? br_nf_hook_thresh+0x303/0x410 [ 771.165451][ C1] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 771.165482][ C1] arch_stack_walk+0x100/0x170 [ 771.165512][ C1] ? br_nf_hook_thresh+0x303/0x410 [ 771.165540][ C1] stack_trace_save+0x95/0xd0 [ 771.165570][ C1] ? __pfx_stack_trace_save+0x10/0x10 [ 771.165603][ C1] ? hlock_class+0x4e/0x130 [ 771.165630][ C1] save_stack+0x162/0x1f0 [ 771.165660][ C1] ? __pfx_save_stack+0x10/0x10 [ 771.165689][ C1] ? post_alloc_hook+0x2d1/0x350 [ 771.165721][ C1] ? get_page_from_freelist+0x1351/0x2e50 [ 771.165745][ C1] ? __alloc_pages_noprof+0x22b/0x2460 [ 771.165770][ C1] ? alloc_slab_page+0x4e/0xf0 [ 771.165798][ C1] ? new_slab+0x84/0x260 [ 771.165829][ C1] ? ___slab_alloc+0xdac/0x1870 [ 771.165862][ C1] ? __slab_alloc.constprop.0+0x56/0xb0 [ 771.165896][ C1] ? kmem_cache_alloc_noprof+0x2a7/0x2f0 [ 771.165928][ C1] ? skb_clone+0x190/0x3f0 [ 771.165958][ C1] ? deliver_clone+0x3f/0xa0 [ 771.165992][ C1] ? maybe_deliver+0xa7/0x120 [ 771.166032][ C1] ? br_flood+0x17e/0x5c0 [ 771.166064][ C1] ? br_handle_frame_finish+0xda5/0x1c80 [ 771.166090][ C1] ? br_nf_hook_thresh+0x303/0x410 [ 771.166122][ C1] __set_page_owner+0x8b/0x560 [ 771.166156][ C1] ? __pfx___set_page_owner+0x10/0x10 [ 771.166188][ C1] ? bad_range+0x264/0x440 [ 771.166218][ C1] ? lockdep_hardirqs_on+0x7c/0x110 [ 771.166252][ C1] post_alloc_hook+0x2d1/0x350 [ 771.166289][ C1] get_page_from_freelist+0x1351/0x2e50 [ 771.166327][ C1] ? __pfx_get_page_from_freelist+0x10/0x10 [ 771.166352][ C1] ? should_fail_alloc_page+0xee/0x130 [ 771.166378][ C1] ? prepare_alloc_pages.constprop.0+0x16f/0x560 [ 771.166412][ C1] ? lockdep_hardirqs_on+0x7c/0x110 [ 771.166445][ C1] __alloc_pages_noprof+0x22b/0x2460 [ 771.166473][ C1] ? __lock_acquire+0x1620/0x3cb0 [ 771.166514][ C1] ? __pfx___alloc_pages_noprof+0x10/0x10 [ 771.166541][ C1] ? __pfx___lock_acquire+0x10/0x10 [ 771.166573][ C1] ? __pfx_ip6_mc_input+0x10/0x10 [ 771.166609][ C1] ? __pfx_mark_lock+0x10/0x10 [ 771.166644][ C1] ? lock_acquire+0x1b1/0x560 [ 771.166677][ C1] ? find_held_lock+0x2d/0x110 [ 771.166707][ C1] ? __slab_alloc.constprop.0+0x56/0xb0 [ 771.166742][ C1] ? __pfx_lock_release+0x10/0x10 [ 771.166777][ C1] alloc_slab_page+0x4e/0xf0 [ 771.166807][ C1] new_slab+0x84/0x260 [ 771.166841][ C1] ___slab_alloc+0xdac/0x1870 [ 771.166875][ C1] ? skb_clone+0x190/0x3f0 [ 771.166915][ C1] ? __rhashtable_lookup.isra.0+0x28e/0x6a0 [ 771.166949][ C1] ? skb_clone+0x190/0x3f0 [ 771.166982][ C1] ? __slab_alloc.constprop.0+0x56/0xb0 [ 771.167021][ C1] __slab_alloc.constprop.0+0x56/0xb0 [ 771.167060][ C1] kmem_cache_alloc_noprof+0x2a7/0x2f0 [ 771.167096][ C1] ? skb_clone+0x190/0x3f0 [ 771.167132][ C1] skb_clone+0x190/0x3f0 [ 771.167168][ C1] deliver_clone+0x3f/0xa0 [ 771.167204][ C1] maybe_deliver+0xa7/0x120 [ 771.167241][ C1] br_flood+0x17e/0x5c0 [ 771.167281][ C1] br_handle_frame_finish+0xda5/0x1c80 [ 771.167311][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 771.167341][ C1] ? __pfx_nf_conntrack_icmpv6_error+0x10/0x10 [ 771.167373][ C1] ? ip6t_do_table+0xd20/0x1d40 [ 771.167404][ C1] ? __local_bh_enable_ip+0xa4/0x120 [ 771.167431][ C1] ? ip6t_do_table+0xd50/0x1d40 [ 771.167465][ C1] ? nf_hook_slow+0x132/0x200 [ 771.167498][ C1] br_nf_hook_thresh+0x303/0x410 [ 771.167524][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 771.167555][ C1] ? __pfx_br_nf_hook_thresh+0x10/0x10 [ 771.167584][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 771.167613][ C1] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 771.167638][ C1] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 771.167665][ C1] br_nf_pre_routing_finish_ipv6+0x76a/0xfb0 [ 771.167695][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 771.167726][ C1] br_nf_pre_routing_ipv6+0x3ce/0x8c0 [ 771.167756][ C1] ? __pfx_br_nf_pre_routing_ipv6+0x10/0x10 [ 771.167783][ C1] ? __pfx_lock_release+0x10/0x10 [ 771.167818][ C1] ? __pfx_br_nf_pre_routing_finish_ipv6+0x10/0x10 [ 771.167854][ C1] br_nf_pre_routing+0x860/0x15b0 [ 771.167885][ C1] br_handle_frame+0x9eb/0x1490 [ 771.167914][ C1] ? __pfx_br_handle_frame+0x10/0x10 [ 771.167943][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 771.167969][ C1] ? mark_lock+0xb5/0xc60 [ 771.168010][ C1] ? __pfx_br_handle_frame+0x10/0x10 [ 771.168036][ C1] __netif_receive_skb_core.constprop.0+0xa3d/0x4330 [ 771.168078][ C1] ? kfree_skbmem+0x1a4/0x1f0 [ 771.168110][ C1] ? __pfx___netif_receive_skb_core.constprop.0+0x10/0x10 [ 771.168142][ C1] ? hlock_class+0x4e/0x130 [ 771.168169][ C1] ? __lock_acquire+0xbdd/0x3cb0 [ 771.168210][ C1] ? __pfx___lock_acquire+0x10/0x10 [ 771.168243][ C1] ? __pfx_ip6_rcv_finish+0x10/0x10 [ 771.168282][ C1] ? lock_acquire+0x1b1/0x560 [ 771.168316][ C1] ? process_backlog+0x3f1/0x15f0 [ 771.168345][ C1] __netif_receive_skb_one_core+0xb1/0x1e0 [ 771.168378][ C1] ? __pfx___netif_receive_skb_one_core+0x10/0x10 [ 771.168408][ C1] ? process_backlog+0x3f1/0x15f0 [ 771.168438][ C1] ? __pfx_lock_release+0x10/0x10 [ 771.168474][ C1] ? mark_held_locks+0x9f/0xe0 [ 771.168508][ C1] ? process_backlog+0x3f1/0x15f0 [ 771.168537][ C1] __netif_receive_skb+0x1d/0x160 [ 771.168568][ C1] process_backlog+0x443/0x15f0 [ 771.168603][ C1] __napi_poll.constprop.0+0xb7/0x550 [ 771.168638][ C1] net_rx_action+0xa92/0x1010 [ 771.168671][ C1] ? tmigr_handle_remote+0x153/0xdd0 [ 771.168702][ C1] ? __pfx_net_rx_action+0x10/0x10 [ 771.168733][ C1] ? __pfx_tmigr_handle_remote+0x10/0x10 [ 771.168759][ C1] ? run_timer_base+0x119/0x190 [ 771.168804][ C1] ? run_timer_base+0x11e/0x190 [ 771.168836][ C1] ? __pfx_run_timer_base+0x10/0x10 [ 771.168874][ C1] handle_softirqs+0x216/0x8f0 [ 771.168904][ C1] ? __pfx_handle_softirqs+0x10/0x10 [ 771.168931][ C1] ? irqtime_account_irq+0x18d/0x2e0 [ 771.168957][ C1] ? batadv_tt_local_purge+0x21c/0x3c0 [ 771.169000][ C1] do_softirq+0xb2/0xf0 [ 771.169026][ C1] [ 771.169034][ C1] [ 771.169042][ C1] __local_bh_enable_ip+0x100/0x120 [ 771.169071][ C1] batadv_tt_local_purge+0x21c/0x3c0 [ 771.169112][ C1] ? __pfx_batadv_tt_local_purge+0x10/0x10 [ 771.169153][ C1] batadv_tt_purge+0x86/0xb90 [ 771.169194][ C1] ? __pfx_batadv_tt_purge+0x10/0x10 [ 771.169229][ C1] ? __pfx_lock_release+0x10/0x10 [ 771.169270][ C1] process_one_work+0x9c5/0x1b40 [ 771.169313][ C1] ? __pfx_batadv_nc_worker+0x10/0x10 [ 771.169346][ C1] ? __pfx_process_one_work+0x10/0x10 [ 771.169387][ C1] ? assign_work+0x1a0/0x250 [ 771.169422][ C1] worker_thread+0x6c8/0xed0 [ 771.169463][ C1] ? __kthread_parkme+0x148/0x220 [ 771.169494][ C1] ? __pfx_worker_thread+0x10/0x10 [ 771.169528][ C1] kthread+0x2c1/0x3a0 [ 771.169555][ C1] ? _raw_spin_unlock_irq+0x23/0x50 [ 771.169585][ C1] ? __pfx_kthread+0x10/0x10 [ 771.169613][ C1] ret_from_fork+0x45/0x80 [ 771.169647][ C1] ? __pfx_kthread+0x10/0x10 [ 771.169675][ C1] ret_from_fork_asm+0x1a/0x30 [ 771.169718][ C1] [ 771.528267][ T30] Kernel panic - not syncing: hung_task: blocked tasks [ 771.528287][ T30] CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted 6.11.0-rc6-syzkaller-00017-gc9f016e72b5c #0 [ 771.528319][ T30] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 771.528334][ T30] Call Trace: [ 771.528344][ T30] [ 771.528356][ T30] dump_stack_lvl+0x3d/0x1f0 [ 771.528389][ T30] panic+0x6dc/0x7c0 [ 771.528423][ T30] ? __pfx_panic+0x10/0x10 [ 771.528454][ T30] ? preempt_schedule_thunk+0x1a/0x30 [ 771.528486][ T30] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 771.528520][ T30] ? preempt_schedule_thunk+0x1a/0x30 [ 771.528548][ T30] ? watchdog+0xd76/0x1240 [ 771.528572][ T30] ? watchdog+0xd69/0x1240 [ 771.528601][ T30] watchdog+0xd87/0x1240 [ 771.528633][ T30] ? __pfx_watchdog+0x10/0x10 [ 771.528656][ T30] ? lockdep_hardirqs_on+0x7c/0x110 [ 771.528691][ T30] ? __kthread_parkme+0x148/0x220 [ 771.528723][ T30] ? __pfx_watchdog+0x10/0x10 [ 771.528749][ T30] kthread+0x2c1/0x3a0 [ 771.528775][ T30] ? _raw_spin_unlock_irq+0x23/0x50 [ 771.528806][ T30] ? __pfx_kthread+0x10/0x10 [ 771.528836][ T30] ret_from_fork+0x45/0x80 [ 771.528870][ T30] ? __pfx_kthread+0x10/0x10 [ 771.528898][ T30] ret_from_fork_asm+0x1a/0x30 [ 771.528948][ T30] [ 771.529214][ T30] Kernel Offset: disabled